As we reported last week, on Tuesday, the 12th of July, Microsoft rolled out four security bulletins meant to address a grand total of 22 vulnerabilities that plagued the Windows operating system and the Office productivity suite. All we knew until now was that out of the four bulletins, one is rated 'critical' and the remaining three are rated 'important'.

Redmond-based software giant has made public additional information on the security bulletins it released as part if the Patch Tuesday. Read them below (for additional info visit Microsoft's site here).

Sponsored Links

MS11-053 - Vulnerability in Bluetooth Stack Could Allow Remote Code ExecutionRating: Critical.Affected software: Microsoft Windows.Description: a privately reported vulnerability in the Windows Bluetooth Stack that could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. On a compromised system the attacker could install programs, view/change/delete data, or create new accounts with full user right. Systems without Bluetooth capabilities are not affected.

MS11-054 - Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of PrivilegeRating: Important.Affected software: Microsoft Windows.Description: 15 privately reported vulnerabilities that affect Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. To exploit these vulnerabilities, an attacker must have valid logon credentials and be able to log on locally.

MS11-056 - Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of PrivilegeRating: Important.Affected software: Microsoft Windows.Description: five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS), vulnerabilities that could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. To exploit the vulnerabilities, an attacker must have valid logon credentials and be able to log on locally.

MS11-055 - Vulnerability in Microsoft Visio Could Allow Remote Code ExecutionRating: Important.Affected software: Microsoft Office.Description: a publicly disclosed vulnerability in Microsoft Visio, vulnerability that could allow remote code execution if a user opens a legitimate Visio file that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.

The Microsoft Security Response Center (MSRC) has provided these visual representations of the July 2011 Patch Tuesday.